chknet.io - secure XMPP server for covert operations

xmpp.net score

We use a self-signed certificate because we believe there are no certificate (and not limited to) authorities you should trust, only trust yourself and our original certificate fingerprints:

MD5DA:34:1C:37:B4:80:9C:89:C8:4B:12:30:F3:79:9E:54
SHA15D:F9:57:0A:33:C2:59:EF:38:1A:CF:91:22:FE:25:AC:67:F2:45:80
SHA256E6:C4:A6:D3:35:8E:71:44:B5:B5:F5:86:86:35:63:96:87:95:C5:34:88:30:77:56:66:F7:62:85:D4:5A:37:6C
(Psi+) Open certificate details to check the fingerprint (Psi+) Compare the fingerprint against we provide on this page (Psi+) Add to exceptions in case of successful match

The above example shows a Psi+ client, if the fingerprint is different for you it means your ISP, proxy or VPN provider is trying to tamper your connection. Decent XMPP clients usually alert users whenever a certificate fingerprint change.

Don't be an idiot and remember to always use PGP, OMEMO or OTR to encrypt your communications!